{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T21:23:48Z","timestamp":1743888228957},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,1,20]],"date-time":"2018-01-20T00:00:00Z","timestamp":1516406400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s11277-018-5306-4","type":"journal-article","created":{"date-parts":[[2018,1,20]],"date-time":"2018-01-20T14:48:06Z","timestamp":1516459686000},"page":"1639-1659","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Ensemble Classifiers with Drift Detection (ECDD) in Traffic Flow Streams to Detect DDOS Attacks"],"prefix":"10.1007","volume":"99","author":[{"given":"K. Munivara","family":"Prasad","sequence":"first","affiliation":[]},{"given":"A.","family":"Rama Mohan Reddy","sequence":"additional","affiliation":[]},{"given":"K.","family":"Venugopal Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,20]]},"reference":[{"issue":"5","key":"5306_CR1","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"71","author":"F Palmieri","year":"2015","unstructured":"Palmieri, F., et al. (2015). Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. The Journal of Supercomputing, 71(5), 1620\u20131641.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"5306_CR2","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., et al. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602\u2013622.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5306_CR3","unstructured":"Najafabadi, M. M., et al. (2016). RUDY attack: Detection at the network level and its important features. In The twenty-ninth international flairs conference (pp. 288\u2013293). Marco Island: Hilton."},{"key":"5306_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-017-4375-0","volume":"97","author":"KM Prasad","year":"2017","unstructured":"Prasad, K. M., Rama Mohan Reddy, A., & Venugopal Rao, K. (2017). BIFAD: Bio-inspired anomaly based HTTP-flood attack detection. Wireless Personal Communications, 97, 1\u201328.","journal-title":"Wireless Personal Communications"},{"issue":"20","key":"5306_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5120\/5807-8063","volume":"41","author":"S VivinSandar","year":"2012","unstructured":"VivinSandar, S., & Shenai, S. (2012). Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks. International Journal of Computer Applications, 41(20), 11\u201316.","journal-title":"International Journal of Computer Applications"},{"issue":"1-3","key":"5306_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","volume":"101","author":"F Iglesias","year":"2015","unstructured":"Iglesias, F., & Zseby, T. (2015). Analysis of network traffic features for anomaly detection. Machine Learning, 101(1-3), 59\u201384.","journal-title":"Machine Learning"},{"key":"5306_CR7","doi-asserted-by":"crossref","unstructured":"Claise, B., Trammell, B., & Aitken, P. (2013). Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information. No. RFC 7011.","DOI":"10.17487\/rfc7011"},{"key":"5306_CR8","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-34135-9_20","volume":"335","author":"E Cambiaso","year":"2012","unstructured":"Cambiaso, E., Papaleo, G., & Aiello, M. (2012). Taxonomy of slow DoS attacks to web applications. Recent Trends in Computer Networks and Distributed Systems Security, 335, 195\u2013204.","journal-title":"Recent Trends in Computer Networks and Distributed Systems Security"},{"key":"5306_CR9","unstructured":"Akamai: Akamai\u2019s [State of the Internet]\/Security Q1\/2016 Report. \n                    http:\/\/www.akamai.com\/\n                    \n                   State of The Internet (2016)."},{"key":"5306_CR10","doi-asserted-by":"crossref","unstructured":"Alkasassbeh, M., et al. (2016). Detecting distributed denial of service attacks using data mining techniques. International Journal of Advanced Computer Science and Applications 7(1).","DOI":"10.14569\/IJACSA.2016.070159"},{"issue":"7","key":"5306_CR11","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1093\/comjnl\/bxp078","volume":"53","author":"Georgios Loukas","year":"2009","unstructured":"Loukas, Georgios, & \u00d6ke, G\u00fclay. (2009). Protection against denial of service attacks: A survey. The Computer Journal, 53(7), 1020\u20131037.","journal-title":"The Computer Journal"},{"issue":"1","key":"5306_CR12","first-page":"579","volume":"12","author":"A Bivens","year":"2002","unstructured":"Bivens, A., et al. (2002). Network-based intrusion detection using neural networks. Intelligent Engineering Systems through Artificial Neural Networks, 12(1), 579\u2013584.","journal-title":"Intelligent Engineering Systems through Artificial Neural Networks"},{"issue":"10","key":"5306_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.15623\/ijret.2014.0310045","volume":"3","author":"S Apale","year":"2014","unstructured":"Apale, S., et al. (2014). Defense mechanism for DDoS attack through machine learning. International Journal of Research in Engineering and Technology, 3(10), 291\u2013294.","journal-title":"International Journal of Research in Engineering and Technology"},{"key":"5306_CR14","unstructured":"Vijayasarathy, R., Raghavan, S. V., & Ravindran, B. (2011). A system approach to network modeling for DDoS detection using a Naive Bayesian classifier. In IEEE third international conference on communication systems and networks (COMSNETS) (pp. 1\u201310), Bangalore."},{"issue":"18","key":"5306_CR15","doi-asserted-by":"publisher","first-page":"5036","DOI":"10.1016\/j.comnet.2007.08.008","volume":"51","author":"K Lu","year":"2007","unstructured":"Lu, K., et al. (2007). Robust and efficient detection of DDoS attacks for large-scale internet. Computer Networks, 51(18), 5036\u20135056.","journal-title":"Computer Networks"},{"key":"5306_CR16","doi-asserted-by":"crossref","unstructured":"Pan, W., & Weihua, L. (2005). A hybrid neural network approach to the classification of novel attacks for intrusion detection. In International symposium on parallel and distributed processing and applications. Springer: Berlin.","DOI":"10.1007\/11576235_58"},{"key":"5306_CR17","unstructured":"Norouzian, M. R., & Merati, S. (2011). Classifying attacks in a network intrusion detection system based on artificial neural networks. In IEEE 13th international conference on advanced communication technology (ICACT), Republic of Korea, (pp. 868\u2013873)."},{"key":"5306_CR18","doi-asserted-by":"crossref","unstructured":"Haddadi, F., et al. (2010). Intrusion detection and attack classification using feed-forward neural network. In Second International Conference on Computer and Network Technology, Minneapolis, MN, USA (pp. 262\u2013266).","DOI":"10.1109\/ICCNT.2010.28"},{"key":"5306_CR19","unstructured":"Zhang, Z., Li, J., Manikopoulos, C. N., Jorgenson, J., & Ucles, J. (2001). HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proceedings of IEEE Workshop on Information Assurance and Security, United States, (pp. 85\u201390)."},{"key":"5306_CR20","unstructured":"Karimazad, R., & Faraahi, A. (2011). An anomaly-based method for DDoS attacks detection using RBF neural networks. In Proceedings of the international conference on network and electronics engineering , Singapore (pp. 16\u201318)."},{"key":"5306_CR21","unstructured":"Jawale, M. D. R., & Bhusari, V. (2014). Technique to detect and classify attacks in nids using ann, pp. 75\u201381."},{"key":"5306_CR22","doi-asserted-by":"crossref","unstructured":"Barford, P., & Plonka, D. (2001). Characteristics of network traffic flow anomalies. In Proceedings of the 1st ACM SIGCOMM workshop on internet measurement. Cambridge: ACM.","DOI":"10.1145\/505202.505211"},{"key":"5306_CR23","doi-asserted-by":"crossref","unstructured":"Kalliola, A., Lee, K., Lee, H., & Aura, T. (2015). Flooding DDoS mitigation and traffic management with software defined networking. In IEEE 4th international conference on cloud networking (CloudNet), Canada (pp. 248\u2013254).","DOI":"10.1109\/CloudNet.2015.7335317"},{"key":"5306_CR24","doi-asserted-by":"crossref","unstructured":"Seufert, S., & O\u2019Brien, D. (2007). Machine learning for automatic defence against distributed denial of service attacks. In IEEE international conference on communications, ICC\u201907, Scotland (pp. 1217\u20131222).","DOI":"10.1109\/ICC.2007.206"},{"key":"5306_CR25","doi-asserted-by":"crossref","unstructured":"Berral, Josep L., et al. (2008). Adaptive distributed mechanism against flooding network attacks based on machine learning. In Proceedings of the 1st ACM workshop on Workshop on AISec, ACM.","DOI":"10.1145\/1456377.1456389"},{"issue":"2","key":"5306_CR26","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang, G.-B., et al. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(2), 513\u2013529.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"5306_CR27","doi-asserted-by":"crossref","unstructured":"Srimuang, W., & Intarasothonchun, S. (2015). Classification model of network intrusion using weighted extreme learning machine. In 12th IEEE international joint conference on computer science and software engineering (JCSSE), Thailand (pp. 190\u2013194).","DOI":"10.1109\/JCSSE.2015.7219794"},{"issue":"8","key":"5306_CR28","doi-asserted-by":"publisher","first-page":"4062","DOI":"10.1016\/j.eswa.2014.12.040","volume":"42","author":"John M Fossaceca","year":"2015","unstructured":"Fossaceca, John M., Mazzuchi, Thomas A., & Sarkani, Shahram. (2015). MARK-ELM: Application of a novel multiple kernel learning framework for improving the robustness of network intrusion detection. Expert Systems with Applications, 42(8), 4062\u20134080.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"5306_CR29","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","volume":"36","author":"PAR Kumar","year":"2013","unstructured":"Kumar, P. A. R., & Selvakumar, S. (2013). Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, 36(3), 303\u2013319.","journal-title":"Computer Communications"},{"issue":"2","key":"5306_CR30","doi-asserted-by":"publisher","first-page":"486","DOI":"10.5812\/ijem.3505","volume":"10","author":"Asghar Ghasemi","year":"2012","unstructured":"Ghasemi, Asghar, & Zahediasl, Saleh. (2012). Normality tests for statistical analysis: A guide for non-statisticians. International Journal of Endocrinology and Metabolism, 10(2), 486.","journal-title":"International Journal of Endocrinology and Metabolism"},{"key":"5306_CR31","unstructured":"Revathi, S., & Malathi, A. (2013). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering 2(12)."},{"key":"5306_CR32","unstructured":"KDD data set, 1999. \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\n                    \n                  ."},{"key":"5306_CR33","unstructured":"The CAIDA, \u2018\u2018DDoS Attack 2007\u2019\u2019, Dataset Paul Hick, Emile Aben, kc claffy, Josh Polterock. Available from \n                    http:\/\/www.caida.org\/data\/passive\/ddos-20070804dataset.xml\n                    \n                  ."},{"key":"5306_CR34","unstructured":"CAIDA UCSD Network telescope, \u2018\u2018Three days of conficker\u2019\u2019 \u2013 November 2008, Paul Hick, Emile Aben, Dan Andersen, kcclaffy. Available from \n                    http:\/\/www.caida.org\/data\/passive\/telescope-3days-conficker_dataset.xml\n                    \n                  ."},{"key":"5306_CR35","doi-asserted-by":"crossref","unstructured":"Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In IEEE symposium on security and privacy (SP).","DOI":"10.1109\/SP.2010.25"},{"issue":"3","key":"5306_CR36","first-page":"383","volume":"19","author":"Sunny Behal","year":"2017","unstructured":"Behal, Sunny, & Kumar, Krishan. (2017). Characterization and comparison of DDoS attack tools and traffic generators: A review. IJ Network Security, 19(3), 383\u2013393.","journal-title":"IJ Network Security"},{"key":"5306_CR37","doi-asserted-by":"crossref","unstructured":"Badve, O. P., & Gupta, B. B. (2016). Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment. In Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer: New Delhi.","DOI":"10.1007\/978-81-322-2638-3_76"},{"key":"5306_CR38","doi-asserted-by":"crossref","unstructured":"Kiran, S., Mohapatra, A., & Swamy, R. (2015). Experiences in performance testing of web applications with Unified Authentication platform using Jmeter. In International symposium on technology management and emerging technologies (ISTMET).","DOI":"10.1109\/ISTMET.2015.7359004"},{"key":"5306_CR39","unstructured":"Powers, D. M. (2011). Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation."},{"key":"5306_CR40","doi-asserted-by":"crossref","unstructured":"An, T. K., & Kim, M. H. (2010). A new diverse AdaBoost classifier. In IEEE computer society proceedings of the international conference on artificial intelligence and computational intelligence, China (Vol. 01, pp. 359\u2013363).","DOI":"10.1109\/AICI.2010.82"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5306-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5306-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5306-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T00:40:02Z","timestamp":1547944802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5306-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,20]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["5306"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5306-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,20]]},"assertion":[{"value":"20 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}